(On a virtualized network deployed using iMaster NCE-Campus, after an administrator performs an operation, iMaster NCE-Campus delivers the following configuration to devices. Which of the following operations did the administrator perform?)
acl number9997
rule1permit ip source ucl-groupnameResearch_Group destination ucl-groupnameSales_Group
rule2permit ip source ucl-groupnameResearch_Group destination ucl-groupnameGuest_Group
(As shown in the following figure, R1 and R2 establish an IPsec VPN in ISAKMP mode for communication. For IPsec proposals on R1 and R2, ESP is used, the encapsulation mode is set to tunnel mode, SHA1 is configured as the authentication algorithm, and AES-256 is configured as the encryption algorithm. In addition, IKEv1 is configured for IKE peers, the main mode is configured for IKEv1 negotiation phase 1, and the PSK Huawei@123 is configured for PSK authentication between IKE peers. For IKE proposals on R1 and R2, SHA1 is configured as the authentication algorithm, AES-256 is configured as the encryption algorithm, and DH group 1 is configured for IKE negotiation. Based on these configurations on R1 and R2, drag the configuration items on the left to the correct locations on the right.)



(Which of the following technologies can be used to isolate users in the same VLAN, enhance user communication security, and prevent invalid broadcast packets from affecting services?)
(MAC address learning of a static VXLAN tunnel depends on exchange of packets, such as ARP packets, between hosts.)
(During WLAN planning and design, channels 1, 6, and 11 are recommended on the 2.4 GHz frequency band, and channels 1, 5, 9, and 13 are recommended in high-density scenarios. On the 5 GHz frequency band, it is recommended that high-frequency and low-frequency channels of adjacent APs be staggered to prevent overlapping.)
(On a virtualized network deployed using iMaster NCE-Campus, which of the following methods can be used by a network administrator during VN creation to create user network segments?)
(On a small- or medium-sized campus network deployed based on the Huawei CloudCampus Solution, an AR functioning as the egress gateway supports web-based network management, registration center query, and DHCP Option 148-based deployment, but does not support CLI-based deployment.)
(When advertising routes, BGP EVPN uses EVPN Router's MAC Extended Community to carry the Router MAC field of a VTEP.)
(Network Quality Analysis (NQA) is a real-time network performance detection and measurement technology. It monitors the performance of multiple protocols running on a network. Which of the following can be monitored by NQA?)
(Free mobility is deployed on a campus network through iMaster NCE-Campus. To enable a policy enforcement point to obtain IP-security group entries, which of the following methods can be used?)
(When access authentication is deployed on a network, which of the following servers typically reside in the pre-authentication domain?)
(On the Device Management page of iMaster NCE-Campus, which of the following functions will automatically enable the SSH proxy tunnel of the network device?)
(On a small- or medium-sized campus network, multi-carrier links can be deployed at the egress for backup to ensure egress reliability.)
(Refer to the figure.

Which of the following steps aremandatoryto enable 802.1X authentication on GE0/0/2 and GE0/0/3 of SW3 and configure a RADIUS server to authenticate and deliver network access rights to users?Choose all that apply.)
(Which of the following advantages are provided by Telemetry compared with SNMP?Choose all that apply.)
(Which of the following statements isfalseabout sites on a virtualized network deployed using iMaster NCE-Campus?)
(An administrator monitors the network status on iMaster NCE-Campus. The figure shows alarm information displayed on iMaster NCE-Campus. How manywarning alarmsare generated on the network?)

(Fabric nodes need to be planned during fabric design on a CloudCampus virtualized campus network. Which of the following statements about node planning on a fabric is false?)
(Based on the VXLAN tunnel creation mode, what are the different types of VXLAN tunnels?)
(ESP is an IP-based transport-layer protocol. Which of the following is its protocol number?)
(Both SNMP and NETCONF can be used to manage network devices. Which of the following statements about the two protocols is true?)
(After the Huawei CloudCampus Solution is deployed on a campus network, which of the following protocol packets may be exchanged between the management layer and network layer?)
(iMaster NCE-CampusInsight uses SNMP technology to collect metrics and logs of network devices and detects network exceptions based on real service traffic.)
(On a small- or medium-sized campus network deployed based on the Huawei CloudCampus Solution, if a single AP is used as the network egress and needs to be managed by iMaster NCE-Campus, in which of the following modes should the AP work?)
(When configuring access authentication, you need to define the items authorized to users in the authorization result. Which of the following items does not need to be defined?)
(Which of the following statements about authentication profile configuration is true?)
(Which of the following roles is not a core role in Huawei's free mobility solution?)